use-after-free
Here are 13 public repositories matching this topic...
Software based Side Channel attacks
-
Updated
Jul 19, 2020
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
-
Updated
Oct 31, 2021 - Python
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
-
Updated
Feb 13, 2023 - JavaScript
Light-weight (as light as hydrogen) unit test framework for C/C++, since 2012
-
Updated
May 6, 2023 - C++
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
-
Updated
May 7, 2023 - C
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
-
Updated
May 7, 2023 - C
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
-
Updated
Dec 5, 2023 - JavaScript
Foxit PDF Reader Remote Code Execution Exploit
-
Updated
Dec 5, 2023 - JavaScript
CWE-416 Use-After-Free Vulnerability, Attack and Fix
-
Updated
Dec 21, 2023 - C
A set of example C programs that demonstrate common programming mistakes, and provides results on which static code analyzers can detect these mistakes.
-
Updated
Feb 11, 2024 - C
Fully Randomized Pointers
-
Updated
May 22, 2024 - C
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
-
Updated
Jul 23, 2024 - C
Improve this page
Add a description, image, and links to the use-after-free topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the use-after-free topic, visit your repo's landing page and select "manage topics."